Click to jump to signature section
Source: Traffic | Snort IDS: 2030491 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) 192.168.2.14:40794 -> 154.9.29.154:55650 |
Source: Traffic | Snort IDS: 2030491 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) 192.168.2.14:40796 -> 154.9.29.154:55650 |
Source: global traffic | TCP traffic: 192.168.2.14:40794 -> 154.9.29.154:55650 |
Source: global traffic | TCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.125.190.26 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.125.190.26 |
Source: unknown | DNS traffic detected: queries for: wcjwcj.cn |
Source: unknown | Network traffic detected: HTTP traffic on port 46540 -> 443 |
Source: sg123JWcuU.elf, type: SAMPLE | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5499.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5489.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5487.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5491.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5495.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sg123JWcuU.elf PID: 5487, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sg123JWcuU.elf PID: 5489, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sg123JWcuU.elf PID: 5491, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sg123JWcuU.elf PID: 5495, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sg123JWcuU.elf PID: 5499, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: ELF static info symbol of initial sample | .symtab present: no |
Source: /tmp/sg123JWcuU.elf (PID: 5493) | SIGKILL sent: pid: 5495, result: successful | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5495) | SIGKILL sent: pid: -5489, result: unknown | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5499) | SIGKILL sent: pid: 1 (init), result: successful | Jump to behavior |
Source: sg123JWcuU.elf, type: SAMPLE | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5499.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5489.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5487.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5491.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5495.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sg123JWcuU.elf PID: 5487, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sg123JWcuU.elf PID: 5489, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sg123JWcuU.elf PID: 5491, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sg123JWcuU.elf PID: 5495, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sg123JWcuU.elf PID: 5499, type: MEMORYSTR | Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: classification engine | Classification label: mal84.troj.evad.linELF@0/0@2/0 |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/22/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/23/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/24/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/25/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/26/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/10/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/11/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/12/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/13/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/14/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/15/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/16/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/17/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/18/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/19/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/1/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/2/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/3/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/4/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/5/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/6/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/7/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/8/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/9/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/20/cmdline | Jump to behavior |
Source: /tmp/sg123JWcuU.elf (PID: 5491) | File opened: /proc/21/cmdline | Jump to behavior |
Source: sg123JWcuU.elf, 5487.1.00007ffeac26f000.00007ffeac290000.rw-.sdmp, sg123JWcuU.elf, 5489.1.00007ffeac26f000.00007ffeac290000.rw-.sdmp, sg123JWcuU.elf, 5491.1.00007ffeac26f000.00007ffeac290000.rw-.sdmp, sg123JWcuU.elf, 5495.1.00007ffeac26f000.00007ffeac290000.rw-.sdmp, sg123JWcuU.elf, 5499.1.00007ffeac26f000.00007ffeac290000.rw-.sdmp | Binary or memory string: Ex86_64/usr/bin/qemu-sparc/tmp/sg123JWcuU.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sg123JWcuU.elf |
Source: sg123JWcuU.elf, 5487.1.0000560ff407e000.0000560ff4103000.rw-.sdmp, sg123JWcuU.elf, 5489.1.0000560ff407e000.0000560ff40e3000.rw-.sdmp, sg123JWcuU.elf, 5491.1.0000560ff407e000.0000560ff40e3000.rw-.sdmp, sg123JWcuU.elf, 5495.1.0000560ff407e000.0000560ff40e3000.rw-.sdmp, sg123JWcuU.elf, 5499.1.0000560ff407e000.0000560ff40e3000.rw-.sdmp | Binary or memory string: /etc/qemu-binfmt/sparc |
Source: sg123JWcuU.elf, 5487.1.0000560ff407e000.0000560ff4103000.rw-.sdmp, sg123JWcuU.elf, 5489.1.0000560ff407e000.0000560ff40e3000.rw-.sdmp, sg123JWcuU.elf, 5491.1.0000560ff407e000.0000560ff40e3000.rw-.sdmp, sg123JWcuU.elf, 5495.1.0000560ff407e000.0000560ff40e3000.rw-.sdmp, sg123JWcuU.elf, 5499.1.0000560ff407e000.0000560ff40e3000.rw-.sdmp | Binary or memory string: V!/etc/qemu-binfmt/sparc |
Source: sg123JWcuU.elf, 5487.1.00007ffeac26f000.00007ffeac290000.rw-.sdmp, sg123JWcuU.elf, 5489.1.00007ffeac26f000.00007ffeac290000.rw-.sdmp, sg123JWcuU.elf, 5491.1.00007ffeac26f000.00007ffeac290000.rw-.sdmp, sg123JWcuU.elf, 5495.1.00007ffeac26f000.00007ffeac290000.rw-.sdmp, sg123JWcuU.elf, 5499.1.00007ffeac26f000.00007ffeac290000.rw-.sdmp | Binary or memory string: /usr/bin/qemu-sparc |
Source: Yara match | File source: sg123JWcuU.elf, type: SAMPLE |
Source: Yara match | File source: 5499.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5489.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5487.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5491.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5495.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: sg123JWcuU.elf PID: 5487, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sg123JWcuU.elf PID: 5489, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sg123JWcuU.elf PID: 5491, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sg123JWcuU.elf PID: 5495, type: MEMORYSTR |
Source: Traffic | Snort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) |
Source: Traffic | Snort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) |
Source: Traffic | Snort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) |
Source: Traffic | Snort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) |
Source: Traffic | Snort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) |
Source: Traffic | Snort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) |
Source: Traffic | Snort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) |
Source: Traffic | Snort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) |
Source: Yara match | File source: sg123JWcuU.elf, type: SAMPLE |
Source: Yara match | File source: 5499.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5489.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5487.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5491.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: 5495.1.00007f9fd8011000.00007f9fd8020000.r-x.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: sg123JWcuU.elf PID: 5487, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sg123JWcuU.elf PID: 5489, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sg123JWcuU.elf PID: 5491, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: sg123JWcuU.elf PID: 5495, type: MEMORYSTR |